시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,9612015/01/20 2012622  ET CURRENT_EVENTS Adobe Flash Unicode SWF File Embedded in Office File Caution - Could be Hostile; [1,2,3
9,9602015/01/20 2012621  ET CURRENT_EVENTS Adobe Flash SWF File Embedded in XLS FILE Caution - Could be Exploit; [1,2
9,9592015/01/20 2012620  ET TROJAN Win32.FakeAV.chhq Checkin;  
9,9582015/01/20 2012619  ET USER_AGENTS Suspicious User-Agent Mozilla/3.0;  
9,9572015/01/20 2012618  ET DELETED .dll Request Without User-Agent Likely Malware;  
9,9562015/01/20 2012617  ET TROJAN Unknown Malware PatchPathNewS3.dat Request;  
9,9552015/01/20 2012616  ET TROJAN Slugin.A PatchTimeCheck.dat Request;  
9,9542015/01/20 2012615  ET MALWARE Unknown Malware PUTLINK Command Message;  
9,9532015/01/20 2012614  ET CURRENT_EVENTS Internal WebServer Compromised By Lizamoon Mass SQL-Injection Attacks; [1
9,9522015/01/20 2012613  ET DELETED SpyeEye Trojan Request file=grabbers;  
9,9512015/01/20 2012612  ET TROJAN Hiloti Style GET to PHP with invalid terse MSIE headers;  
9,9502015/01/20 2012611  ET USER_AGENTS Suspicious User-Agent Sample;  
9,9492015/01/20 2012610  ET CURRENT_EVENTS Java Exploit io.exe download served;  
9,9482015/01/20 2012609  ET CURRENT_EVENTS Phoenix Java Exploit Attempt Request for .class from octal host; [1
9,9472015/01/20 2012608  ET DELETED Java Exploit Attempt applet via file URI; [1
9,9462015/01/20 2012607  ET USER_AGENTS Lowercase User-Agent header purporting to be MSIE;  
9,9452015/01/20 2012606  ET SCAN Havij SQL Injection Tool User-Agent Inbound; [1
9,9442015/01/20 2012605  ET WEB_SPECIFIC_APPS ardeaCore PHP Framework CURRENT_BLOG_PATH Parameter Remote File Inclusion Attempt; [1,2
9,9432015/01/20 2012604  ET WEB_SPECIFIC_APPS ardeaCore PHP Framework appMVCPath Parameter Remote File Inclusion Attempt; [1,2
9,9422015/01/20 2012603  ET WEB_SPECIFIC_APPS Interleave basicstats.php AjaxHandler Parameter Cross Site Scripting Attempt; [1,2
9,9412015/01/20 2012601  ET WEB_SPECIFIC_APPS WordPress Lazyest Gallery Plugin image Parameter Cross Site Scripting Attempt; [1,2
9,9402015/01/20 2012600  ET WEB_SPECIFIC_APPS mySeatXT SQL Injection Attempt autocomplete.php field UPDATE; [1
9,9392015/01/20 2012599  ET WEB_SPECIFIC_APPS mySeatXT SQL Injection Attempt autocomplete.php field ASCII; [1
9,9382015/01/20 2012598  ET WEB_SPECIFIC_APPS mySeatXT SQL Injection Attempt autocomplete.php field DELETE; [1
9,9372015/01/20 2012597  ET WEB_SPECIFIC_APPS mySeatXT SQL Injection Attempt autocomplete.php field INSERT; [1
9,9362015/01/20 2012596  ET WEB_SPECIFIC_APPS mySeatXT SQL Injection Attempt autocomplete.php field UNION SELECT; [1
9,9352015/01/20 2012595  ET WEB_SPECIFIC_APPS mySeatXT SQL Injection Attempt autocomplete.php field SELECT; [1
9,9342015/01/20 2012593  ET POLICY HTTP Request to a *.ce.ms domain;  
9,9332015/01/20 2012592  ET TROJAN PWS-Banker.gen.b Reporting; [1
9,9322015/01/20 2012591  ET DELETED EICAR test file with MZ header double-stacking AV evasion technique; [1,2
9,9312015/01/20 2012590  ET TROJAN Best Spyware Scanner FaveAV Download;  
9,9302015/01/20 2012589  ET DELETED Trojan-Dropper.Win32.Mudrop.asj Reporting; [1
9,9292015/01/20 2012588  ET DELETED RiskTool.Win32.WFPDisabler Reporting; [1
9,9282015/01/20 2012587  ET TROJAN VirTool-Win32-VBInject.gen-FA Reporting; [1
9,9272015/01/20 2012586  ET TROJAN Suspicious User-Agent Im Luo;  
9,9262015/01/20 2012585  ET WEB_SPECIFIC_APPS coRED CMS rubID Parameter DELETE FROM SQL Injection Attempt; [1
9,9252015/01/20 2012584  ET WEB_SPECIFIC_APPS ardeaCore PHP Framework CURRENT_BLOG_PATH Parameter Remote File Inclusion Attempt; [1,2
9,9242015/01/20 2012583  ET WEB_SPECIFIC_APPS ardeaCore PHP Framework appMVCPath Parameter Remote File Inclusion Attempt; [1,2
9,9232015/01/20 2012582  ET DELETED Interleave basicstats.php AjaxHandler Parameter Cross Site Scripting Attempt; [1,2
9,9222015/01/20 2012581  ET WEB_SPECIFIC_APPS WordPress Lazyest Gallery Plugin image Parameter Cross Site Scripting Attempt; [1,2
9,9212015/01/20 2012580  ET DELETED mySeatXT SQL Injection Attempt autocomplete.php field UPDATE; [1
9,9202015/01/20 2012579  ET WEB_SPECIFIC_APPS mySeatXT SQL Injection Attempt autocomplete.php field ASCII; [1
9,9192015/01/20 2012578  ET DELETED mySeatXT SQL Injection Attempt autocomplete.php field DELETE; [1
9,9182015/01/20 2012577  ET WEB_SPECIFIC_APPS mySeatXT SQL Injection Attempt autocomplete.php field INSERT; [1
9,9172015/01/20 2012576  ET DELETED mySeatXT SQL Injection Attempt autocomplete.php field UNION SELECT; [1
9,9162015/01/20 2012575  ET WEB_SPECIFIC_APPS mySeatXT SQL Injection Attempt autocomplete.php field SELECT; [1
9,9152015/01/20 2012574  ET WEB_SPECIFIC_APPS RecordPress header.php rp-menu.php Cross Site Scripting Attempt; [1
9,9142015/01/20 2012573  ET WEB_SPECIFIC_APPS RecordPress header.php Cross Site Scripting Attempt; [1
9,9132015/01/20 2012572  ET WEB_SPECIFIC_APPS Mambo Cache_Lite Class mosConfig_absolute_path Remote File inclusion Attempt; [1
9,9122015/01/20 2012571  ET WEB_SPECIFIC_APPS jQuery Mega Menu Wordpress Plugin Local File Inclusion Attempt; [1
< 341  342  343  344  345  346  347  348  349  350 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.